System Design Approach for Control of Differentially Private
Dynamical Systems
Abstract
This paper introduces a novel approach to concurrently design dynamic controllers and correlated differential privacy noise in dynamic control systems. An increase in privacy noise increases the system’s privacy but adversely affects the system’s performance. Our approach optimizes the noise distribution while shaping closed-loop system dynamics such that the privacy noise has the least impact on system performance and the most effect on system privacy. We further add privacy noise to both control input and system output to privatize the system’s state for an adversary with access to both communication channels and direct output measurements. The study also suggests tailored privacy bounds for different states, providing a comprehensive framework for jointly optimizing system performance and privacy in the context of differential privacy.
I Introduction
In today’s increasingly interconnected and data-driven world, it has become important for connected entities to share information with each other to work efficiently. This applies not just to individuals, but also to Cyber-Physical Systems (CPS) in various sectors, including industrial control systems, power grids, financial markets, and commercial and military communication networks. This pervasive data sharing has also brought forth heightened concerns regarding system security, safety and privacy. With private entities, government organizations, and adversaries engaging in extensive data collection and analysis, the risk of exposing sensitive information has significantly increased, posing potential harm to both individuals and critical systems. This has led to the development of mechanisms providing different kinds of privacy guarantees. Examples include differential privacy, information-theoretic privacy, and privacy based on secure multiparty computation.
Differential privacy was originally designed to protect the data of individuals in static databases, but its application has expanded to address the privacy challenges posed by dynamic and interconnected data ecosystems, such as Cyber-Physical Systems (CPS) and Internet of Things (IoT) devices [1, 2]. At a basic level, a differentially private mechanism ensures that the results of a query remain approximately unchanged if data belonging to any single user, or a single row, in the database are modified [3]. Informally, differential privacy makes similar data appear approximately indistinguishable from one another [4]. The most important feature of differential privacy is its protection from post-processing or its robustness in the presence of side information [5]. However, there is a price associated with making the system differentially private. Differential privacy works by adding noise to the system which leads to a degradation in system performance both in static and dynamic cases [5, 6].
In recent years, researchers have extended the work on differential privacy for static databases to differential privacy for dynamic filters [6], control and dynamical systems [3], differentially private LQ Control [4], multi-agent formation control [7], and Differentially private distributed constrained optimization [8]. In differentially private LQ control [4], the authors consider a multi-agent system described using linear system dynamics and add privacy noise such that every agent’s state trajectory is made approximately indistinguishable from all other state trajectories. The paper provides lower and upper bounds on mean square error (MSE) in state estimation for some minimum and maximum privacy noise among agents, where the combined state is estimated using a standard Kalman filter while designing an LQG control for the overall system. The paper further provides guidelines for choosing the privacy level to bound the MSE in the cloud’s state estimates and further provides the cost of privacy in terms of the increase of the quadratic cost. Kawan and Cao [9, 10] show that the Gaussian mechanism evaluates the maximum eigenvalue of the input observability Gramian and thus the addition of even small noise is enough to make the less input observable Gaussian mechanism highly differentially private.
In this paper, we consider the joint design of dynamic controller and differentially private noise (correlated noise with different variances across channels) such that the system performance loss is minimized for a given privacy metric or the privacy metric is maximized for a given system performance. The idea is to find the optimal privacy noise distribution and simultaneously design the closed-loop system dynamics such that the correlated noises enter the system through channels that have the least impact on system performance and maximize system privacy. It can be understood as the following: the larger noise would only be added through the input/output channels whose effect on the system state has been minimized by designing the closed-loop poles. We design a dynamic controller that directly processes the controller states to generate the control signal instead of first estimating the states and then using it to obtain the control input. We assume a smart adversary that will develop an optimal estimator to generate individual signals for more accurate state estimation by leveraging the additional information about the system dynamics. We consider two kinds of adversaries, one that has access to the communication channel and another that has direct access to the measurements. We express a privacy metric in the presence of smart adversaries in terms of uncertainty in the estimation of individual states. We will further design different privacy bounds in different states as some states might need stricter privacy guarantees than other states. This will also be considered for bounding the system performance across different states based on the underlying system.
The organization of the paper can be laid out as follows: Section §II provides the necessary background on differential privacy and the notation required for the rest of the paper. Section §III gives the relationship between differential privacy and error in state estimate and then formulates the final design problem. Section §IV elaborates the system design approach for a general dynamic controller and correlated differential privacy input and output noises and provides the solution as a convex optimization problem. Section §V gives simulation results for differential privacy of a networked power distribution system with load frequency control under unknown power demand and §VI provides the final concluding remarks along with the future work.
II Review of Differential Privacy
In this section, we review the basic definitions and define the Gaussian mechanism used to enforce differential privacy in dynamical systems. We define the expectation operator by and denotes the Gaussian distribution with mean and covariance . The diagonal matrix generated from a vector is denoted as and the block diagonal matrix is denoted as . The symbol defines a zero matrix with suitable dimensions and defines the unit matrix of appropriate dimensions. The notations and denote the symmetric positive definite and symmetric positive semidefinite matrices, respectively.
Let us consider agent’s state trajectories of the form , where and for all , and let us denote the set of all such sequences by . Let us define our adjacency relation over .
Definition 1.
(Adjacency for trajectories): Let us choose as the adjacency parameter and as two trajectories that are adjacent if . We write if and are adjacent, and , otherwise.
This adjacency relation requires that an agent’s state trajectory be made approximately indistinguishable within distance from all other state trajectories. Let us consider that the agent’s output signal is of dimension at each point in time and is in the set . Next, we define the sensitivity of a dynamical system.
Definition 2.
(Sensitivity): The p-norm sensitivity of a system is the greatest distance between two output trajectories that correspond to adjacent state trajectories:
Now, we define differential privacy for dynamic systems (see [6] for a formal construction).
Definition 3.
(Differential privacy for trajectories): Let and be given. A mechanism is -differentially private if, for all adjacent , we have:
We now define the Gaussian mechanism.
Lemma 1.
(Gaussian mechanism; [6]): Let us use privacy parameters and and adjacency parameter . Let denote a dynamical system and denote its 2-norm sensitivity. Then the Gaussian mechanism makes the system -differentially private with respect to , if , and , where , with , representing the Gaussian tail integral.
III Problem Formulation
The main objective of the research is to make the state of the agents differentially private by adding privacy noise while achieving the desired system performance. The privacy noise can be added to (refer fig. 1):
-
•
System output: Add differential privacy noise to the outputs measured by the sensors as .
-
•
Control input: Add differential privacy noise directly to the control input as .
Notice that the control input noise is a physically feasible way to insert privacy noise into the system. Also, the actual privacy noise should be calculated by accounting for the actuator noise present in the system. We further consider two cases based on the capability of the adversary (refer fig. 1):
-
•
In the first case, the adversary listens to the communication between the agents and the centralized controller ((1) ). We add privacy noise to both the outputs measured by the sensor and the control inputs to make the system state differentially private.
-
•
In the second case, the adversary has his own sensors and has direct access to the output of the system ((2) ), and thus adding output privacy noise alone would not make the system differentially private. Although there is no benefit in adding privacy noise to the sensor side, we still add it and expect the design to remove the privacy noise on the output side.
Let us consider a discrete-time linear time-invariant (LTI) system, along with the addition of output privacy noise and control input privacy noise, described by the following state-space representation:
(1) | ||||
(2) | ||||
(3) | ||||
(4) |
where is the state of the system at time , is the control vector at time . The initial state vector and the process noise at time , , are assumed to be independent random variables. In particular, , , with to be known and fixed covariance matrix. The output of the system , is measured by a sensor network with sensor noise modeled as another independent Gaussian random variable , with to be the known and fixed covariance matrix. The performance variable defines the variables of interest for the system.
The control input privacy noise, , and output privacy noise, , are modeled as random variables, and , , with and being the covariance matrix, representing the strength of the added noise. We further define the inverse of the respective noise covariance matrices as:
We assume that the adversary is smart and has full information about the system dynamics, i.e., knowledge of system matrices, . Moreover, the adversary will design an optimal estimator to estimate the system state using a general estimator of the form:
(5) | ||||
(6) |
such that the error in the state estimate is minimized.
III-A Relationship between differential privacy and error in state estimates due to control input and output privacy noise
In this subsection, we show that the differential privacy of the system state can be represented by the error in the estimation of the state while using the optimal state estimator by the adversary of the form eqs. 5 and 6. In particular, the covariance of the state error estimates can be used as a metric to quantify differential privacy, and an increase in error covariance results in an increase in -differentially privacy.
Lemma 2.
(Gaussian mechanism for dynamical system; [6]): Let denote an LTI dynamical system and and let us use privacy parameters . Then the Gaussian mechanism , where is a Gaussian noise with , and , makes the system -differentially private with respect to in , i.e., with .
Remark 1.
The above lemma allows us to make the control input differential private by directly adding the noise to the control inputs when the output is queried and obtained by passing through an LTI dynamical system. In this paper, we want to make the system state differentially private by adding privacy noise to both system inputs and outputs.
Yazdani et. al. [4] used the level of privacy to calculate the impact on estimation error and showed the relationship between the privacy noise and the trace of covariance of the state error estimates where the state estimates are calculated using a Kalman filter. However, another way to look at the impact of differential privacy from the point of view of an adversary is to hinder his capability to estimate the state trajectories accurately. So if an adversary designs an optimal estimator, the error in estimating state trajectories can be used as a metric of differential privacy. Next, we expand on the results generated in [4] to quantify standard ()-differential privacy as the error in adversary’s state estimates due to both control input and output privacy noise.
Lemma 3.
For the given dynamical systems in (Eq. (1)-(3)) with both control input privacy noise and output privacy noise , with , and for a given adjacency with , if the states are ()-differential private with and
where represents the maximum singular value, represents the smallest eigenvalue of the matrix, and is the value of corresponding to the index for which the diagonal element of is maximum, then the state error estimate is lower bounded by with .
Proof.
Here we consider both control input privacy noise and output privacy noise along with the already present process and measurement noise. Thus the equation for a priori state error covariance follows:
and for a posteriori state error covariance follows:
After that, it follows directly from (Theorem 2 of [4]) where we consider a single agent with state dimension instead of the multi-agent case. ∎
The above result is used to show that enforcing differential privacy to the systems’ state ensures a lower bound on state estimation error. Please note that the above result provides a necessary condition for differential privacy based on the lower bound on state estimation error. More work is needed to find the bounds for sufficiency.
Remark 2.
Please note that both the performance norm and the estimator error covariance increases with an increase in output and control input privacy noises, and our objective is to find the optimum noise level along with the controller and estimator to minimize the performance norm for a given error covariance.
Main Design Problem Formulation: Design the strength of privacy noises, and , and an optimal state estimator of the form eqs. 5 and 6, and a general linear dynamic controller of the form:
(7) | ||||
(8) |
such that the state error covariance is maximized while closed-loop system performance is bounded .
(11) |
Another problem of interest can be to minimize the closed-loop system performance while lower bounding the state error covariance for some given , i.e., to have higher differential privacy than some specified limit.
(14) |
For the two cases that we discussed based on the capabilities of the adversary, the information available to the estimator would change from (1) to (2) .
Remark 3.
Notice that the estimator design from the point of view of the adversary is general and can be used to simultaneously design the estimator with the privacy noise for the case of open loop system dynamics also, i.e. with .
IV Final Design Solution Development
In this section, we develop frameworks for the co-design of input and output privacy noise with a dynamic feedback controller; and the co-design of input and output privacy noise with an optimal estimator. We further provide the final design algorithm for the two cases of adversarial capabilities. In both cases, we formulate the problem such that the controller gets the output signal with added privacy noise and let the optimization solve the optimal privacy noise.
IV-A Adversary with access to communication channels
For the case where the adversary listens to the noisy output passed through the communication channel , the final design problem can be solved using the following result.
Theorem 1.
For the dynamical system given in eqs. 1 and 3 with adversary listening through the communication channel, and to maximize differential privacy for a fixed performance bound, the optimal design solution with privacy noises, and , an optimal state estimator of the form eqs. 5 and 6, and a general linear dynamic controller of the form eqs. 7 and 8, can be solved as a convex optimization problem using the following LMIs:
(15) |
(16) |
(17) |
(18) |
and finally, the optimal estimator and dynamic controller can be calculated as:
(19) | ||||
(20) |
(21) |
Proof.
We first design the dynamic controller of the form eqs. 7 and 8. We assume the direct feedforward term in the dynamic controller to be zero for the bounded control input covariance. Using the above compensator, the closed-loop system dynamics can be written using the augmented state vector with augmented process noise as:
(22) | ||||
(23) |
and , where
(28) |
It is a standard result that the above closed loop system is stable and a steady-state state covariance matrix () exists, if:
(29) |
which using Schur’s complement gives:
(30) |
where represents the corresponding transpose of the symmetric block. It is straightforward to show that the performance covariance can be bounded as: which can be written as:
(31) |
Notice that the constraint in Eqn. (30) is not an LMI. We need to perform congruence transformation and change of variables to convert them to LMIs [11, 12]. Let us define and partition the matrix as:
and the transformation matrix
and associated congruence transformation matrices
Applying to Eqn. (30) and Eqn. (31), we obtain:
(32) |
(33) |
Expansion of eqs. 32 and 33 under an appropriate change of variables leads to a set of LMIs eqs. 15 and 16 that do not depend on or . Once the are obtained, matrices and need to be constructed using:
(34) |
and, a handy choice of and satisfying eq. 34 is , then . Notice that when the controller has the same order as the plant, and are square and non-singular matrices, in which case the controller gain matrices can be calculated using eq. 21.
Although the original problem was to maximize the to increase the differential privacy, but an increase in error covariance can also result from suboptimal estimator gains. However, as we consider a smart adversary, who would always design an optimal estimator, we update the design problem to maximize the privacy noises while bounding the error covariance.
Let us design the estimator to bound the error covariance for different states with the estimator dynamics given as:
(35) |
Combining the above estimator and the underlying dynamics given in eqs. 1 and 2, the combined dynamics can be written using the augmented state vector as:
(36) |
(41) |
and the error in estimation can be written as:
(43) |
Similar to the previous development for the existence of the steady-state state covariance matrix () and stability of the system, we write:
(44) |
and the error covariance can be bounded as:
(45) |
Again noticing that the constraint in Eqn. (44) is not an LMI, we follow a similar procedure, by partitioning the state covariance matrix and performing the congruence transformation to obtain the LMIs given in eqs. 17 and 18. Once the are obtained, matrix can be constructed using:
(46) |
and the estimator matrices can be constructed using eqs. 19 and 20. ∎
IV-B Adversary with direct access to measurements
For the case where the adversary uses his own sensors to measure the system output , the output privacy noise will not help in privatizing the system and the final design problem will change as follows.
Theorem 2.
For the dynamical system given in eqs. 1 and 3 with an adversary using his own sensors to measure the system output, and to maximize differential privacy for a fixed performance bound, the optimal design solution with privacy noises, and , an optimal state estimator (eqs. 5 and 6), and a general linear dynamic controller (eqs. 7 and 8), can be solved as a convex optimization problem using the following LMIs:
(47) |
(48) |
and finally, the optimal estimator and dynamic controller can be calculated as eqs. 19 and 20 and eq. 21.
Proof.
Remark 4.
Notice that the design solution presented in Theorem 1 and Theorem 2 is overparameterized, i.e., can help many different controllers/estimators to obtain the same result with different realizations of and that can further serve as an optimization domain for some other higher level objective function.
IV-C Estimator for unstable systems
The discrete estimator design approach presented earlier is not valid for unstable systems as eq. 44 requires the system matrix to be stable for a valid positive definite solution for . Thus, we now present the results for unstable system dynamics which restricts the estimator design to:
and thus is the only design variable for the estimator. Notice that the control input will cancel out in the estimator as the adversary also has direct access to it. Combining the above estimator and the underlying dynamics given in eqs. 1 and 2, the error dynamics can be written as:
Now for the unstable dynamical system, the system design problem can be solved using the following results. Notice that the approach can also be used to only design an estimator and input/output privacy noises for the case of an open-loop unstable dynamical process.
Corollary 1.
For the unstable dynamical system given in eqs. 1 and 3 with an adversary using his own sensors to measure the output, and to maximize differential privacy for a fixed performance bound, the optimal design solution with privacy noises, and , an optimal state estimator of the form eqs. 5 and 6, and a general linear dynamic controller of the form eqs. 7 and 8, can be solved as a convex optimization problem using the following LMIs:
(51) | |||
(58) |
and finally, the dynamic controller can be calculated as eq. 21 and optimal estimator as:
Proof.
We use the standard result that the error dynamics is stable and a steady-state error covariance matrix () is bounded, if:
which can be written using Schur’s complement:
Corollary 2.
Similar to Corollary 1, but with an adversary using his own sensors to measure the system output, the optimal design problem can be solved as a convex optimization problem using the following LMIs:
(61) | |||
(67) |
and finally, the dynamic controller can be calculated as eq. 21 and optimal estimator as:
V Simulation Results
The Load Frequency Control (LFC) system maintains a balanced power distribution across different regions by continuously aligning energy demand with generation. LFC involves the transmission of data from remote areas to a central control center, and back to the power production facilities. This communication process in power grids has well-known privacy concerns and thus becomes the motivation for our example [4, 13]. We illustrate the performance of the proposed architecture on a connected four-area network which is obtained from a network-reduced IEEE New England 39-bus system [14]. We consider a lossless, connected, and network-reduced power system with each generator modeled by the following equation [14]:
where is the generator rotor angles w.r.t a synchronously rotating reference axis, is the frequency deviation w.r.t a synchronous frequency which is for a 60 Hz system, represents the inertia, represents the damping matrix, represents the unknown power demand modeled as disturbance, represents the frequency-droop, and and are the turbine power and time constants, respectively [14]. We linearize the generator model and define the state with four-area network system as:
with the parameters for the networked system given in table I. Finally, we discretize the system dynamics with and , where is the sampling period.
Parameters | Area 1 | Area 2 | Area 3 | Area 4 |
---|---|---|---|---|
0.1667 | 0.2222 | 0.16 | 0.1304 | |
0.0083 | 0.0088 | 0.0080 | 0.0088 | |
0.3 | 0.33 | 0.35 | 0.375 |
The communication graph structure is the same as the physical connection graph (fig. 2), with all the per unit line voltages chosen to be and line coefficients of the power flow are taken as p.u. and [14]. We assume the measurement model to be graph Laplacian:
The above measurement model implies that each individual area measures the sum of the phase difference between itself and physically connected areas through net tie-line active power flow measurement. We assume that we can measure the absolute phase angle of area 4 by comparing it with known reference . We bound the deviation in turbine power by choosing the performance variable state as: and want to obtain the same level of privacy in frequency deviation for each area in the system .
The design problem is to find the optimal privacy noise in control input and output channels and simultaneously design the controller to bound the covariance of the deviation in the turbine power while preserving the privacy of the frequency deviation for each area . Figure 3 shows the optimal input privacy noises for each of the control inputs to obtain the same level of privacy for each of . Notice that the intensity of the noise required is different in each channel based on the open loop and finally the closed-loop dynamics of each area. Also, the intensity of the noise increases with the level of privacy but there is a change in respective ratios of the noise intensity between different channels showing a non-scaled parameterization of the privacy noise and thus the need for the co-design of the noises and the controller. Also, notice that the amount of privacy noise required for the second case with () is more than the first case () as there is no contribution from the output privacy noise towards the privacy of the system.
Figure 4 shows similar plots for the optimal output privacy noise for two cases that are based on adversarial capabilities. Notice that the amount of privacy signal required to obtain the desired performance bound increases with an increase in desired differential privacy. Moreover, the amount of privacy noise added in the output channel is much higher than the input channels as the output channel directly affects the state estimates and indirectly affects the system performance after passing through the controller dynamics, but the input channel directly affects the system performance and indirectly affects state estimates after passing through the system dynamics. Notice that the amount of noise added in the second case with () is zero as it does not help increase the differential privacy but adversely affects the system performance.
Finally, fig. 5 shows the plots for the system performance in terms of variance of deviation in turbine power for different areas. Notice that higher differential privacy results in a higher variance in deviation, i.e., an adverse effect on system performance. Notice that we minimized the performance loss for the given privacy level and thus different areas result in different performance levels. Also, the variance in deviation is higher for the second case with a stronger adversary with direct access to the measurement as only input privacy noise is effective in providing privacy which has a worse effect on system performance.
VI Conclusion
The paper showed that the joint design of differential privacy noise distribution and a general dynamic controller can be posed as a convex optimization problem using the Linear Matrix Inequalities framework. The framework adds privacy noise to both control input and system output to privatize the system’s state. The co-design problem also designs an optimal estimator from the perspective of the adversary with access to both communication channels and direct output measurements. The simulation results show the interplay between the controller gains and the privacy noise to obtain the desired level of privacy while minimizing the system performance as a measure of the variance of deviation from reference. The results show the effectiveness of input and output privacy noise based on the capabilities of the adversary and show the need for the co-design of the privacy noises with the controller.
References
- [1] C. Dwork, A. Roth et al., “The algorithmic foundations of differential privacy,” Foundations and Trends® in Theoretical Computer Science, vol. 9, no. 3–4, pp. 211–407, 2014.
- [2] C. Dwork, “Differential privacy: A survey of results,” in International conference on theory and applications of models of computation. Springer, 2008, pp. 1–19.
- [3] S. Han and G. J. Pappas, “Privacy in control and dynamical systems,” Annual Review of Control, Robotics, and Autonomous Systems, vol. 1, pp. 309–332, 2018.
- [4] K. Yazdani, A. Jones, K. Leahy, and M. Hale, “Differentially private lq control,” IEEE Transactions on Automatic Control, vol. 68, no. 2, pp. 1061–1068, 2022.
- [5] M. U. Hassan, M. H. Rehmani, and J. Chen, “Differential privacy techniques for cyber physical systems: a survey,” IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 746–789, 2019.
- [6] J. Le Ny and G. J. Pappas, “Differentially private filtering,” IEEE Transactions on Automatic Control, vol. 59, no. 2, pp. 341–354, 2013.
- [7] C. Hawkins and M. Hale, “Differentially private formation control: Privacy and network co-design,” arXiv preprint arXiv:2205.13406, 2022.
- [8] S. Han, U. Topcu, and G. J. Pappas, “Differentially private distributed constrained optimization,” IEEE Transactions on Automatic Control, vol. 62, no. 1, pp. 50–64, 2016.
- [9] Y. Kawano and M. Cao, “Design of privacy-preserving dynamic controllers,” IEEE Transactions on Automatic Control, vol. 65, no. 9, pp. 3863–3878, 2020.
- [10] Y. Kawano and M. Cao, “Differential privacy and qualitative privacy analysis for nonlinear dynamical systems,” IFAC-PapersOnLine, vol. 51, no. 23, pp. 52–57, 2018.
- [11] C. Scherer, P. Gahinet, and M. Chilali, “Multiobjective output-feedback control via lmi optimization,” IEEE Transactions on Automatic Control, vol. 42, no. 7, pp. 896–911, 1997.
- [12] R. Goyal, M. Majji, and R. E. Skelton, “Integrating structure, information architecture and control design: Application to tensegrity systems,” Mechanical Systems and Signal Processing, vol. 161, p. 107913, 2021.
- [13] P. McDaniel and S. McLaughlin, “Security and privacy challenges in the smart grid,” IEEE Security & Privacy, vol. 7, no. 3, pp. 75–77, 2009.
- [14] H. Bevrani, Robust power system frequency control. Springer, 2014, vol. 4.